audit: type=1800 audit(1546723962.588:71): pid=17034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=17041 res=0 audit: type=1804 audit(1546723962.588:72): pid=17034 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/140/bus" dev="sda1" ino=17041 res=1 ====================================================== WARNING: possible circular locking dependency detected 4.20.0+ #11 Not tainted ------------------------------------------------------ syz-executor0/17034 is trying to acquire lock: 00000000ddf28c4e (fs_reclaim){+.+.}, at: fs_reclaim_acquire.part.0+0x0/0x30 mm/internal.h:79 but task is already holding lock: 00000000db203ae3 (delayed_uprobe_lock){+.+.}, at: update_ref_ctr+0x288/0x5a0 kernel/events/uprobes.c:445 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (delayed_uprobe_lock){+.+.}: __mutex_lock_common kernel/locking/mutex.c:925 [inline] __mutex_lock+0x12f/0x1670 kernel/locking/mutex.c:1072 mutex_lock_nested+0x16/0x20 kernel/locking/mutex.c:1087 uprobe_clear_state+0xad/0x380 kernel/events/uprobes.c:1511 __mmput kernel/fork.c:1042 [inline] mmput+0x1af/0x640 kernel/fork.c:1067 binder_alloc_free_page+0x597/0x1620 drivers/android/binder_alloc.c:984 __list_lru_walk_one+0x267/0x880 mm/list_lru.c:234 list_lru_walk_one+0xa3/0xe0 mm/list_lru.c:278 list_lru_walk_node+0x43/0x280 mm/list_lru.c:307 list_lru_walk include/linux/list_lru.h:214 [inline] binder_shrink_scan+0x16d/0x210 drivers/android/binder_alloc.c:1020 do_shrink_slab+0x4e5/0xd30 mm/vmscan.c:561 shrink_slab mm/vmscan.c:710 [inline] shrink_slab+0x6bb/0x8c0 mm/vmscan.c:690 shrink_node+0x61a/0x17e0 mm/vmscan.c:2757 shrink_zones mm/vmscan.c:2987 [inline] do_try_to_free_pages+0x3e2/0x1290 mm/vmscan.c:3049 try_to_free_pages+0x4b9/0xb70 mm/vmscan.c:3265 __perform_reclaim mm/page_alloc.c:3920 [inline] __alloc_pages_direct_reclaim mm/page_alloc.c:3942 [inline] __alloc_pages_slowpath+0x9e0/0x2cc0 mm/page_alloc.c:4335 __alloc_pages_nodemask+0xa37/0xdc0 mm/page_alloc.c:4549 __alloc_pages include/linux/gfp.h:473 [inline] __alloc_pages_node include/linux/gfp.h:486 [inline] khugepaged_alloc_page+0x95/0x190 mm/khugepaged.c:773 collapse_huge_page+0x141/0x2240 mm/khugepaged.c:962 khugepaged_scan_pmd+0x165f/0x1f00 mm/khugepaged.c:1214 khugepaged_scan_mm_slot mm/khugepaged.c:1723 [inline] khugepaged_do_scan mm/khugepaged.c:1804 [inline] khugepaged+0xcfe/0x18a0 mm/khugepaged.c:1849 kthread+0x357/0x430 kernel/kthread.c:246 ret_from_fork+0x3a/0x50 arch/x86/entry/entry_64.S:352 -> #0 (fs_reclaim){+.+.}: lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __fs_reclaim_acquire mm/page_alloc.c:3877 [inline] fs_reclaim_acquire.part.0+0x24/0x30 mm/page_alloc.c:3888 fs_reclaim_acquire+0x14/0x20 mm/page_alloc.c:3889 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3365 [inline] kmem_cache_alloc_trace+0x2d/0x760 mm/slab.c:3605 kmalloc include/linux/slab.h:545 [inline] kzalloc include/linux/slab.h:740 [inline] delayed_uprobe_add kernel/events/uprobes.c:313 [inline] update_ref_ctr+0x373/0x5a0 kernel/events/uprobes.c:447 uprobe_write_opcode+0xa23/0xcb0 kernel/events/uprobes.c:496 set_swbp+0x2b/0x40 install_breakpoint kernel/events/uprobes.c:885 [inline] install_breakpoint.isra.0+0x162/0x860 kernel/events/uprobes.c:867 register_for_each_vma+0xaa2/0xef0 kernel/events/uprobes.c:1041 uprobe_apply+0xeb/0x140 kernel/events/uprobes.c:1192 uprobe_perf_open kernel/trace/trace_uprobe.c:1067 [inline] trace_uprobe_register+0x9c9/0xcf0 kernel/trace/trace_uprobe.c:1207 perf_trace_event_open kernel/trace/trace_event_perf.c:181 [inline] perf_trace_event_init kernel/trace/trace_event_perf.c:203 [inline] perf_trace_event_init+0x1a5/0x990 kernel/trace/trace_event_perf.c:190 perf_uprobe_init+0x1db/0x290 kernel/trace/trace_event_perf.c:329 perf_uprobe_event_init+0x106/0x1a0 kernel/events/core.c:8503 perf_try_init_event+0x137/0x2f0 kernel/events/core.c:9770 perf_init_event kernel/events/core.c:9801 [inline] perf_event_alloc.part.0+0x20bf/0x3520 kernel/events/core.c:10074 perf_event_alloc kernel/events/core.c:10430 [inline] __do_sys_perf_event_open+0xbb5/0x2f00 kernel/events/core.c:10531 __se_sys_perf_event_open kernel/events/core.c:10420 [inline] __x64_sys_perf_event_open+0xbe/0x150 kernel/events/core.c:10420 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(delayed_uprobe_lock); lock(fs_reclaim); lock(delayed_uprobe_lock); lock(fs_reclaim); *** DEADLOCK *** 7 locks held by syz-executor0/17034: #0: 00000000264208d4 (&sig->cred_guard_mutex){+.+.}, at: __do_sys_perf_event_open+0x9c3/0x2f00 kernel/events/core.c:10511 #1: 00000000330dd4b9 (&pmus_srcu){....}, at: perf_event_alloc.part.0+0x10c1/0x3520 kernel/events/core.c:10070 #2: 0000000020b523b5 (event_mutex){+.+.}, at: perf_uprobe_init+0x1d0/0x290 kernel/trace/trace_event_perf.c:328 #3: 00000000a1be6cce (&uprobe->register_rwsem){+.+.}, at: uprobe_apply+0x4a/0x140 kernel/events/uprobes.c:1188 #4: 0000000021d0fe9b (&dup_mmap_sem){++++}, at: percpu_down_write+0x9a/0x540 kernel/locking/percpu-rwsem.c:145 #5: 00000000bc992431 (&mm->mmap_sem){++++}, at: register_for_each_vma+0x7d6/0xef0 kernel/events/uprobes.c:1027 #6: 00000000db203ae3 (delayed_uprobe_lock){+.+.}, at: update_ref_ctr+0x288/0x5a0 kernel/events/uprobes.c:445 stack backtrace: CPU: 0 PID: 17034 Comm: syz-executor0 Not tainted 4.20.0+ #11 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1db/0x2d0 lib/dump_stack.c:113 print_circular_bug.isra.0.cold+0x1cc/0x28f kernel/locking/lockdep.c:1224 check_prev_add kernel/locking/lockdep.c:1866 [inline] check_prevs_add kernel/locking/lockdep.c:1979 [inline] validate_chain kernel/locking/lockdep.c:2350 [inline] __lock_acquire+0x3014/0x4a30 kernel/locking/lockdep.c:3338 lock_acquire+0x1db/0x570 kernel/locking/lockdep.c:3841 __fs_reclaim_acquire mm/page_alloc.c:3877 [inline] fs_reclaim_acquire.part.0+0x24/0x30 mm/page_alloc.c:3888 fs_reclaim_acquire+0x14/0x20 mm/page_alloc.c:3889 slab_pre_alloc_hook mm/slab.h:418 [inline] slab_alloc mm/slab.c:3365 [inline] kmem_cache_alloc_trace+0x2d/0x760 mm/slab.c:3605 kmalloc include/linux/slab.h:545 [inline] kzalloc include/linux/slab.h:740 [inline] delayed_uprobe_add kernel/events/uprobes.c:313 [inline] update_ref_ctr+0x373/0x5a0 kernel/events/uprobes.c:447 uprobe_write_opcode+0xa23/0xcb0 kernel/events/uprobes.c:496 set_swbp+0x2b/0x40 install_breakpoint kernel/events/uprobes.c:885 [inline] install_breakpoint.isra.0+0x162/0x860 kernel/events/uprobes.c:867 register_for_each_vma+0xaa2/0xef0 kernel/events/uprobes.c:1041 uprobe_apply+0xeb/0x140 kernel/events/uprobes.c:1192 uprobe_perf_open kernel/trace/trace_uprobe.c:1067 [inline] trace_uprobe_register+0x9c9/0xcf0 kernel/trace/trace_uprobe.c:1207 perf_trace_event_open kernel/trace/trace_event_perf.c:181 [inline] perf_trace_event_init kernel/trace/trace_event_perf.c:203 [inline] perf_trace_event_init+0x1a5/0x990 kernel/trace/trace_event_perf.c:190 perf_uprobe_init+0x1db/0x290 kernel/trace/trace_event_perf.c:329 perf_uprobe_event_init+0x106/0x1a0 kernel/events/core.c:8503 perf_try_init_event+0x137/0x2f0 kernel/events/core.c:9770 perf_init_event kernel/events/core.c:9801 [inline] perf_event_alloc.part.0+0x20bf/0x3520 kernel/events/core.c:10074 perf_event_alloc kernel/events/core.c:10430 [inline] __do_sys_perf_event_open+0xbb5/0x2f00 kernel/events/core.c:10531 __se_sys_perf_event_open kernel/events/core.c:10420 [inline] __x64_sys_perf_event_open+0xbe/0x150 kernel/events/core.c:10420 do_syscall_64+0x1a3/0x800 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x457ec9 Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 RSP: 002b:00007fa71dbc3c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457ec9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000180 RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffffffffffff R11: 0000000000000246 R12: 00007fa71dbc46d4 R13: 00000000004c43bf R14: 00000000004d7708 R15: 00000000ffffffff kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' audit: type=1804 audit(1546723963.668:73): pid=17040 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/140/bus" dev="sda1" ino=17041 res=1 kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env audit: type=1804 audit(1546723963.668:74): pid=17040 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/140/bus" dev="sda1" ino=17041 res=1 kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' block nbd0: Receive control failed (result -22) kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'nbd0' (000000005e8ae9fb): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'nbd0' (000000005e8ae9fb): fill_kobj_path: path = '/devices/virtual/block/nbd0' kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env audit: type=1804 audit(1546723964.148:76): pid=17091 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/141/bus" dev="sda1" ino=17249 res=1 kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' audit: type=1800 audit(1546723964.138:75): pid=17089 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=17249 res=0 kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' block nbd0: shutting down sockets kobject: 'loop2' (000000009ca7b820): kobject_uevent_env audit: type=1800 audit(1546723964.678:77): pid=17112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor0" name="bus" dev="sda1" ino=17169 res=0 kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' audit: type=1804 audit(1546723964.748:78): pid=17112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/142/bus" dev="sda1" ino=17169 res=1 kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env audit: type=1800 audit(1546723964.998:79): pid=17132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="bus" dev="sda1" ino=17036 res=0 kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env audit: type=1804 audit(1546723965.068:80): pid=17132 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir677149384/syzkaller.lTtzhN/313/bus" dev="sda1" ino=17036 res=1 kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env netlink: 'syz-executor0': attribute type 5 has an invalid length. kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' netlink: 'syz-executor0': attribute type 5 has an invalid length. kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' netlink: 'syz-executor0': attribute type 5 has an invalid length. kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' netlink: 'syz-executor0': attribute type 5 has an invalid length. kobject: 'loop0' (0000000064e6e564): kobject_uevent_env kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' netlink: 'syz-executor4': attribute type 5 has an invalid length. kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' netlink: 'syz-executor4': attribute type 5 has an invalid length. kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' netlink: 'syz-executor4': attribute type 5 has an invalid length. kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env FAT-fs (loop5): error, invalid access to FAT (entry 0x00000900) kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' FAT-fs (loop5): Filesystem has been set read-only kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' FAT-fs (loop5): error, invalid access to FAT (entry 0x00000020) kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kauditd_printk_skb: 22 callbacks suppressed audit: type=1804 audit(1546723967.708:103): pid=17255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir416587791/syzkaller.rSQsRC/410/memory.events" dev="sda1" ino=16981 res=1 kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' audit: type=1804 audit(1546723968.208:104): pid=17283 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/150/memory.events" dev="sda1" ino=17031 res=1 kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' audit: type=1804 audit(1546723968.828:105): pid=17302 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir416587791/syzkaller.rSQsRC/411/memory.events" dev="sda1" ino=16753 res=1 kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' audit: type=1804 audit(1546723968.958:106): pid=17307 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir655153572/syzkaller.fWFGPV/151/memory.events" dev="sda1" ino=16676 res=1 kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' audit: type=1804 audit(1546723969.588:107): pid=17319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir416587791/syzkaller.rSQsRC/412/memory.events" dev="sda1" ino=16753 res=1 kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop4' (00000000e6213de2): kobject_uevent_env kobject: 'loop4' (00000000e6213de2): fill_kobj_path: path = '/devices/virtual/block/loop4' kobject: 'loop1' (0000000032e8128e): kobject_uevent_env kobject: 'loop1' (0000000032e8128e): fill_kobj_path: path = '/devices/virtual/block/loop1' kobject: 'loop3' (0000000073fb5ab2): kobject_uevent_env kobject: 'loop3' (0000000073fb5ab2): fill_kobj_path: path = '/devices/virtual/block/loop3' kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop2' (000000009ca7b820): kobject_uevent_env kobject: 'loop2' (000000009ca7b820): fill_kobj_path: path = '/devices/virtual/block/loop2' kobject: 'loop5' (000000007dc0e32f): kobject_uevent_env kobject: 'loop5' (000000007dc0e32f): fill_kobj_path: path = '/devices/virtual/block/loop5' kobject: 'loop0' (0000000064e6e564): kobject_uevent_env kobject: 'loop0' (0000000064e6e564): fill_kobj_path: path = '/devices/virtual/block/loop0'